Energy-Efficient Mobile Data Transport via Online Multi-Network Packet Scheduling

Size: px
Start display at page:

Download "Energy-Efficient Mobile Data Transport via Online Multi-Network Packet Scheduling"

Transcription

1 Energy-Efficient Mobile Data Transport via Online Multi-Network Packet Scheduling Aaron Coté, Adam Meyerson, Brian Tagiku Department of Computer Science University of California, Los Angeles Los Angeles, California, USA Abstract We explore a novel online packet scheduling model related to energy-efficiency in mobile data transport. This model incorporates multiple networks with non-persistent connectivities where we only know which networks are available in the current timestep. When a packet arrives, it specifies a deadline and, for each network, a value it is worth if sent over that network. Our goal is to maximize the total value of packets we send by their deadlines. To encourage energy-efficiency, our model requires that packets have larger values for more energyefficient networks. We demonstrate low-constant-competitive algorithms for this problem and several restrictions. We also provide lower bounds which closely match our competitive ratios and, under some restrictions, are tight. Keywords-packet scheduling; mobile devices; energyefficiency; online algorithms I. INTRODUCTION The introduction of the smartphone has been a boon to modern productivity and personal entertainment. They provide telephony services, internet connectivity and powerful computing all in a portable package. It is for this reason that they are quickly gaining popularity in the global mobile device market [1]. In fact, smartphones are projected to dominate the U.S. mobile phone market by 2011 [2]; it is quite clear that their universality is fast approaching. Yet, all the new features offered by smartphones come at the cost of higher energy demands. Hence, energy-efficient methods are crucial to ensure prolonged battery life of the mobile device. It is particularly important that these energysaving measures not affect the performance of the device. In this work, we address energy-efficiency in perhaps the most attractive feature of a smartphone internet connectivity. Smartphones typically have the ability to connect to the internet either using the cellular network (e.g. 3G or GSM) or using a WiFi connection. WiFi connections are faster and spend less energy per bit sent when the connection is active [3]. However, mobile devices spend most of their time with an idle network connection during which time cellular connections are more energy efficient. Additionally, cellular towers typically have much longer range than WiFi hotspots, offering a more persistent connection. For these reasons, most phones default to a cellular connection since they are idle for most of the time and require the user to select when they want WiFi connectivity. Recent works such as [4], [5], [6] have proposed that mobile devices be more proactive in internet connectivity. These methods explore energy-efficient ways to connect to a WiFi connection when available. This opportunistic WiFi connectivity reaps the benefits of WiFi during data transfer and of cellular connections during idle periods. However, this alone is not enough to ensure optimal energy usage; we should actively try to schedule as many data transfers as possible into a timeframe when WiFi connectivity is available. Doing this would also have the beneficial side effect of alleviating alarmingly high demands on cellular networks [7], [8]. We address this scheduling problem at the network packet level using a novel variant of packet scheduling which we call 2-network packet scheduling. Packets have an associated value gained by sending over a cellular connection and a value gained by sending over a WiFi connection. These values give a numerical interpretation to the utility gained by successfully sending the packet per unit energy spent. Since WiFi connections are more energy efficient, this gives us motivation to try and save as many packets as possible for times when WiFi is available. However, packets also have an associated deadline by which they must be sent in order to receive any value at all. Thus, it is sometimes beneficial for us to send a packet over the cellular connection if there is no hope of sending it over WiFi. Packet models are commonly used within the wireless network community, but the diligent reader might ponder the viability of an arbitrary-length task model. However, the packet based model offers a level of granularity a task model cannot offer. It allows for much better performance in the presence of shorter WiFi connections that could otherwise be missed in a task model. We additionally get quicker adjustment when a user initially crosses into a WiFi hotspot. Arguably, these boundary cases may compose only a small fraction of the overall energy footprint of the mobile device, but note this then implies the average connection (or disconnection) times to a WiFi hotspot is relatively long. In that case, we can expect that all packets from a divided task

2 are likely to be sent over the same network connection, thus closely mimicing a task model. In this work, we provide a constant competitive algorithm for the above problem in general as well as under various restrictions. In addition, we consider a couple partially offline cases. The first assumes all packets are known up front, but may still have varying arrival times. This is a useful model when there are many recurring tasks in the system and few one-time tasks. The second assumes the availability of cellular and WiFi connections at each time step are known in advance, but packets still arrive in an online fashion. This is particularly applicable if the mobile device has a predictive system that can actively learn the user s daily routine (and thus predict when WiFi will be available). The findings in [9] strongly suggest that a very accurate predictor can in fact be built. In all cases, we are able to provide close matching lower bounds and in some cases, tight lower bounds. Lastly, we show that the problem becomes extremely difficult when k 3 networks are considered; no deterministic algorithm can be competitive and any randomized algorithm must have competitive ratio Ω(k). We are able to provide a matching O(k)-competitive randomized algorithm for this case. II. PRELIMINARIES We start by reviewing the framework of online algorithms and competitive analysis. This will allow us to fully define our packet scheduling model and discuss in detail our main results. A. Online Problems and Competitive Analysis We say that a problem is online if the input is revealed piece-by-piece over a length of time. In contrast, an offline problem specifies the entire instance from the beginning. An online problem is usually accompanied by a restriction that at each timestep, some portion of the solution must be locked into place before the instance continues. This creates the difficulty of having to make decisions about the solution without knowing what will happen at future time steps. Competitive analysis is typically the preferred method of online algorithm analysis. This form of analysis quantifies the algorithm s performance by examining the competitive ratio the ratio of the algorithm s solution cost ALG to the optimal offline solution cost OP T. Typically, the competitive ratio is always expressed as a value of at least 1. Thus, if an algorithm has competitive ratio c in a particular problem instance, then this guarantees: 1 ALG OP T c ALG. c Note that this holds regardless of whether the problem is a minimization problem or a maximization problem. We say that an online algorithm is ρ-competitive if its competitive ratio is bounded by ρ for any problem instance. III. RELATED WORK In standard packet scheduling, packets arrive in an online fashion. Each packet p is specified by its arrival time a p, deadline d p and value v p. At each time step t, we are to choose at most one packet p to send such that a p t d p. Our goal is to maximize the total value of packets sent. The online packet scheduling problem first appeared in 2001 in [10] and a deterministic lower bound of the golden ratio φ = was shown in [11] shortly after. The simple greedy algorithm (sending highest value packet first) is known to be 2-competitive [10]. Since then, a number of slight improvements have been made in [12], [13], [14] with the current best being a competitive algorithm. Interestingly, a φ-competitive algorithm is known when packet deadlines are agreeable (a p < a q implies d p d q ) [15]. For randomized algorithms, a lower bound of 1.25 and an algorithm achieving competitive ratio where e is the base of the natural log, are given in [16]. IV. PROBLEM DEFINITION AND RESULTS e e 1, In this work, we extend the packet scheduling model to accommodate multiple networks. In particular, we assume that there is persistent cellular network connection and an unpredictable WiFi network connection. Since the WiFi connectivity is unpredictable, we only know at the current time step whether WiFi is available. Each timestep is classified as either wireless or cellular. Packets possess two values, a cellular value c p and a wireless value w p which correspond to the amounts we receive when sent on the respective networks. We can send at most one packet per timestep, and our goal is still to maximize the total value we receive over the instance. Definition 1 (2-Network Packet Scheduling). A set of packets p = (a p, d p, c p, w p ) arrive in an online fashion. At each time step t, we are told whether or not a WiFi connection is available and we must select at most one packet p with a p t d p to send. If WiFi was available, then we receive w p for sending this packet. Otherwise, we receive c p. Our goal is to maximize the total value we receive throughout the instance. As evident by our definition, we assume that either a cellular or wireless connection is available at each timestep. Thus, we can classify each timestep as a cellular timestep or a WiFi timestep. We also assume that c p w p for all p to reflect the energy-savings associated with WiFi data transport. In addition to the general problem above, we also consider the problem under each of the following restrictions: when w p αc p for some fixed α 1, when all cellular values are equal, when all WiFi values are equal, and when both cellular values are equal and WiFi values are equal.

3 We also consider the problem when the entire set of packets is known in advance, which we refer to as offline packets. Note that this modification makes the problem strictly easier since we can no longer be disrupted by unexpected packet arrivals. However, the problem is still not trivial since we do not know exactly when we ll have connections to WiFi. Complementary to the offline packets version is an offline connectivity variant. Here, we know exactly when we will have connections to WiFi, but packets arrive online. Again, this assumption makes the problem strictly easier than the general version of the problem since we know exactly how much a packet will be worth at each time step. Yet a degree of difficulty still exists due to packets arriving online. We also generalize the above problem to accommodate k 3 networks. Here, networks have a total ordering in terms of energy-efficiency. Thus at any given time we need only consider sending over the most energy-efficient network to which we have a connection. We summarize our results for each of these problem variants in Table I. For all variants (except the generalized k-network version) we are able to give low-constant competitive algorithms and closely matching lower bounds. We are able to relate the offline connectivity problem to standard packet scheduling, which indicates some notion of difficulty in closing the gap in our results. For the k-network version, we prove that no deterministic algorithm can be competitive and that no randomized algorithm can offer a competitive ratio better than Ω(k). Appropriately, we have an O(k)- competitive randomized algorithm for this variant. V. NOTATION Throughout this work, we will use ALG to denote the schedule of an algorithm and OP T to denote the schedule of the optimum offline algorithm. We also abuse notation and use these to denote the actual sets of packets sent and also the total value obtained. It will be useful to distinguish cellularly-sent packets from wirelessly-sent packets. Thus, we use ALG c and ALG w to denote the set (and total value) of packets an algorithm sends over the cellular and wireless networks, respectively. We will similarly use OP T c and OP T w for the optimum offline algorithm. Lastly, we use ALG wc and OP T wc to denote the sum of the cellular values of packets in ALG w and OP T w, respectively. We summarize this notation in Table II. VI. USING FEASIBLE SCHEDULES A typical framework that will be used in this work will be to maintain feasible schedules throughout the execution of the algorithm. A feasible schedule is simply a scheduling of announced (but not necessarily arrived, as in the offline packets case) packets to distinct timeslots so that all scheduled packets could be sent, assuming persistent connectivity and ignoring any further packet announcements. For example, we can compute a feasible schedule by finding a maximum-weight matching of packets to time slots or by following a highest-value-first scheduling policy. These feasible schedules give a possible course of action and as such are useful in guaranteeing that we get a certain amount of profit from scheduled packets. In this section, we explore different types of feasible schedules and the implications of using them. A. Feasible schedules used in this work The first type of feasible schedule we consider is one that follows a most-valuable-packet-first scheduling policy. This type of feasible schedule allows a 2-competitive result for standard packet scheduling as shown in [10]. In fact, we will demonstrate multiple times throughout the paper that even when network connectivity is not persistent, we can remain 2-competitive. Fact 1. For standard packet scheduling, following a mostvaluable-packet-first feasible schedule at each timestep gives a competitive ratio of 2. The second type of feasible schedule we will be using is a maximum-value feasible schedule which is constructed by computing a maximum-weight matching between packets and future timesteps. This type of feasible schedule allows for an interesting 2-competitive algorithm for standard packet scheduling: At each timestep t, compute a maximumvalue feasible schedule and send the packet scheduled at the current timestep. In fact, this is a translation of the 2- competitive algorithm of [17] for the following problem: Definition 2 (Online Max-Weight Matching with Vertex Locking). A set B of nodes is given and a set A of nodes arrives online, each node a A arriving along with its weighted incident edges to B. We must construct a matching of A to B of (approximately) maximum weight. However, when we decide to match a A to b B, this decision is not necessarily fixed for all time. Instead, the nodes of B lock one by one in an online manner. When a node b B locks, it must keep its current match from A forever. If b B is not matched when it locks, then it must remain unmatched forever. Note that we are not required to match all nodes of A or B, although unmatched nodes contribute zero to the objective. For the standard packet scheduling problem, B corresponds to the timeslots and A to the packets. A particular slot t locks when time t passes and we actually transmit packets. Thus, any competitive algorithm for this matching problem will give the same competitive ratio for packet scheduling. For completeness, we have included details of this result of [17] in the Appendix. Fact 2. For standard packet scheduling, following a maximum-value feasible schedule at each time step gives a competitive ratio of 2.

4 Fully Online Offline Packets Offline Connectivity Multiple Networks Equal w General w p αc p Equal c p Equal w p p Equal c p CR: 3 CR: 3α+1+ α 2 +6α+1 CR: 1 + φ CR: 2 CR: 2 2α LB: 2 LB: 2 LB: 2 LB: 2 LB: 2 CR: 3 CR: 3α+1+ α 2 +6α+1 CR: 2 CR: 2 CR: 1 2α LB: 2 LB: 2 LB: 2 LB: 2 LB: 1 CR: 2 CR: 2 CR: 2 CR: 2 CR: φ LB: φ LB: φ LB: φ LB: φ LB: φ LB: LB: LB: LB: LB: Table I SUMMARY OF OUR DETERMINISTIC COMPETITIVE RATIOS (CR) AND LOWER BOUNDS (LB) FOR EACH PROBLEM CONSIDERED. Symbol ALG ALG c ALG w ALG wc OP T OP T c OP T w OP T wc Description set or total value of packets sent by the algorithm set or total value of packets sent over the cellular network in ALG set or total value of packets sent over the WiFi network in ALG total cellular value of packets in ALG w set or total value of packets sent by the optimum offline algorithm set or total value of packets sent over the cellular network in OP T set or total value of packets sent over the WiFi network in OP T total cellular value of packets in OP T w Table II SUMMARY OF NOTATION. B. Effect feasible schedules have on other networks Presumably, any algorithm that maintains a feasible schedule for a particular network connection is saving those packets in hopes that later times will have access to this network. Yet, saving these packets prevents them from being sent over any other network which can be potentially harmful to our performance. In this section, we show that this will not degrade our performance by much. Consider an instance where all timesteps are cellular. Not knowing this, an algorithm maintains at each time t a feasible schedule S t for timesteps t + 1 onward for the WiFi network. Suppose once this algorithm kicks a packet out of the feasible schedule, it is never placed back into the feasible schedule. Surprisingly, if the algorithm sends the highest value packet not in S t, it turns out it will still be 3-competitive on this instance. More generally: Theorem 1. Consider an instance where all timesteps are network B timesteps. If algorithm ALG maintains a feasible schedule S t (for timesteps t + 1 onward) for network A, never readmits packets to the feasible schedule once they are removed, and sends the highest valued packet not in S t over network B on each timestep, then it is 3-competitive on this instance. Proof: Let X be the set of packets OP T sends but we do not over network B. For each packet p X, let x p denote the first time at which it is not in the feasible schedule S t and let a p and d p be its arrival and deadline, respectively. Note that since p was available to send throughout [x p, d p ] it must be that each packet we send during these times are at least as valuable. We will show that for all times t 1 t 2, the number of packets in X such that [x p, d p ] [t 1, t 2 ] is at most 2(t 2 t 1 +1). By Hall s theorem, this will imply a matching in which each of our packets are matched to at most two packets in X (of equal or lesser value) and all packets in X are matched. Fix t 1, t 2 and let X(t 1, t 2 ) denote the set of packets described above. If p is a packet with a p t 1 then [a p, d p ] [t 1, t 2 ]. Thus, OP T must have sent p at some time within [t 1, t 2 ]. It follows that there can be no more than (t 2 t 1 + 1) of these packets. The remaining packets in X(t 1, t 2 ) all have a p < t 1. But since x p t 1 for all these packets, at time t 1 1 we were able to fit all these packets in our feasible schedule. Since all these packets have deadline no later than t 2, it follows that there are no more than (t 2 t 1 + 1) of these packets. Thus, in total X(t 1, t 2 ) 2(t 2 t 1 + 1). So the total value OP T gets from packets in X is no more than twice our total profit. Moreover, the total value OP T gets from packets we also send is at most our total profit. It follows that we must be 3-competitive. VII. ONLINE PACKETS We start by examining the problem in the fully-online situation defined above. We first start with the most general case, then move on towards equal cellular values, equal wireless values and equivalently valued packets.

5 1: for all timesteps t do 2: Compute most-valuable-packet-first feasible schedule S t for times t + 1 onward using WiFi values 3: if t is cellular then 4: send highest cellular value packet not in S t 5: else 6: send highest WiFi value packet 7: end if 8: end for Figure 1. Algorithm for fully online, general 2-network packet scheduling. A. Arbitrary wireless and cellular values We now show that in the general online problem, it is possible to be 3-competitive. Our algorithm is as shown in Figure 1. We prove that this algorithm is 3-competitive via the following lemmas: Lemma 1. 2ALG w OP T w. Proof: We define mapping π : OP T w ALG w such that w p w π(p) for every p OP T w and such that for every q ALG w, we have π 1 (q) 2. The existence of such a mapping proves the claim. Consider a packet p that OP T sends over WiFi at time t p. If p ALG w then set π(p) = p. If at time t p we did not yet send p then p was a candidate packet during t p. This means we must send a packet q of wireless value at least w p at time t p, so set π(p) = q. Otherwise we send p over cellular at some time t p < t p. But at time t p it must be that there were packets scheduled by S tp from times t p + 1 up to d p with wireless value at least t p. One of these packets must be available to be sent at time t p. Thus, we know that the packet q we send at time t p has wireless value at least w p and we can set π(p) = q. Notice that each of our wireless packets is charged at most twice: once by itself and once by the packet OP T sends at the same time. Thus our wireless value is at most half the optimum wireless value. Lemma 2. ALG w + 3ALG c OP T c. Proof: If at every time, we send the highest cellular value packet not in S t then, by Theorem 1, we would have 3ALG c OP T c. However, at WiFi times, we may not be able to send these cellular packets. A close examination of the proof of Theorem 1 will show that these WiFi timesteps become matched with at most one packet that OP T sends cellularly but we do not. This follows simply because OP T cannot send a cellular packet during these times. Additionally, the wireless value we get is greater than the cellular value we would have received. Thus, we recover our losses if we add the value we get from all our wireless packets, finishing the proof. We can now add the inequalities of Lemmas 1 and 2 to show that our algorithm is 3-competitive: 1: for all timesteps t do 2: Compute maximum-value feasible schedule S t for times t onward using cellular values, breaking ties using WiFi values. Ensure that for each packet p scheduled at time t p all packets q scheduled at times in [t p, d p ] satisfy w q c q w p c p. 3: if t is cellular then 4: send the packet scheduled by S t 5: else 6: p scheduled packet in S t 7: q packet with max w q c q of those available 8: if w q c q > βw p then 9: send q 10: else 11: send p 12: end if 13: end if 14: end for Figure 2. Algorithm for fully online, 2-network packet scheduling where wireless values are α times greater than cellular values. Theorem 2. The algorithm in Figure 1 is 3-competitive. B. Wireless values α times greater than cellular values If we are guaranteed that for each packet p we have w p αc p for some large α, then we can actually improve our competitive ratio using the algorithm outlined in Figure 2. To analyze this algorithm, we define the following additional notation: We let ALG f denote the value ALG gets from all packets it sent wirelessly that were first in the feasible schedule at that time. On the other hand, ALG d will denote the value ALG gets from all packets it sent wirelessly that had the highest difference at that time. Note that every wireless packet falls under exactly one of ALG f or ALG d. We also use ALG fc and ALG dc to denote the respective total cellular value of packets in ALG f and ALG d. Finally, we use KICK to denote the total cellular value of packets that were displaced from the feasible schedule due to WiFi times. Lemma 3. 2(ALG d ALG dc )+(1+β)ALG f ALG fc OP T w OP T wc. Proof: Let D(t) to be the value of 2(ALG d ALG dc ) and F (t) be the value of (1 + β)alg f ALG fc at time t. Assuming that the packets ALG has sent up to time t are no longer available, let Z(t) be the maximum sum of differences (e.g. w p c p ) that can be obtained at WiFi times from t onward. Note that D(0) = F (0) = 0 and Z(0) OP T w OP T wc giving D(0) + F (0) + Z(0) OP T w OP T wc. Thus, it is sufficient to show that the following holds for all times t: D(t + 1) + F (t + 1) + Z(t + 1) D(t) + F (t) + Z(t). (1)

6 Suppose t + 1 is a WiFi time. Then our algorithm schedules some packet p and Z(t) schedules some packet q. If p ALG f then D(t + 1) = D(t) F (t + 1) = F (t) + (1 + β)w p c p Z(t + 1) Z(t) (w q c q ) (w p c p ). Since we know βw p w q c q we can combine inequalities to get Equation 1. If p ALG d then D(t + 1) = D(t) + 2(w p c p ) F (t + 1) = F (t) Z(t + 1) Z(t) (w q c q ) (w p c p ) Since we know that w p c p w q c q we again get Equation 1. Thus, Equation 1 holds on every wireless timestep t. Now suppose that t+1 is a cellular time. In this case, our algorithm sends precisely the packet p that was scheduled in the feasible schedule, but Z(t) sends nothing since it only considers WiFi timeslots. Clearly D(t+1) = D(t) and F (t + 1) = F (t). We will show that there exists some Z(t) solution that does not schedule p. This implies Z(t + 1) = Z(t) and that Equation 1 holds on every cellular timestep, thus completing the proof. Suppose, by way of contradiction, that all Z(t) solutions schedule p and consider the one that schedules p earliest. Note since t + 1 is cellular and Z(t) only considers WiFi timeslots, we know the time t p at which Z(t) sends p satisfies t p > t + 1. Thus, we have that d p > t + 1. Since the algorithm sent p, it is currently the first packet in the feasible schedule, and any other packet q in the feasible schedule up to d p must satisfy w q c q w p c p. If one of these packets has deadline d q > d p, then we can make the same claim for all packets up to d q. Ultimately, we can find some time T d p such that packets are scheduled at every timestep between t + 1 and T inclusive, all of these packets have deadline T or earlier, and each of these packets q satisfy (w q c q ) (w p c p ). Let S denote the set of packets the feasible schedule sends between t p and T inclusive and note that p / S. Thus, Z(t) must send some packet q in S prior to t p. However, we can then swap p and q and obtain a Z(t) that schedules p earlier, and still obey deadlines. This contradicts our assumption that Z(t) sends p as early as possible. It follows that some Z(t) solution must not send p. Lemma 4. 2(ALG c + ALG dc + ALG fc + KICK) OP T c + OP T wc. Proof: Let OP T be the optimum offline solution if all time steps were cellular. Clearly OP T OP T c + OP T wc. By Fact 2, we know that always following our feasible schedule will keep us 2-competitive. However, certain packets may be prematurely sent due to a WiFi time slot, but 1: for all timesteps t do 2: Compute most-valuable-packet-first feasible schedule S t consisting of only those packets p with w p φ for times t + 1 onward using WiFi values 3: if t is cellular then 4: send the earliest deadline packet not in S t 5: else 6: if S t then 7: send the highest WiFi value packet 8: else 9: send the earliest deadline packet 10: end if 11: end if 12: end for Figure 3. Algorithm for fully online, 2-network packet scheduling where all cellular values are equal. these are precisely the packets in ALG dc. These packets may kick out the scheduled packets at those times which comprise KICK. If we account for all these packets, we get our result. Combining Lemmas 3 and 4 give us the following theorem: Theorem ( 3. The ) algorithm in Figure 2 is -competitive. 3α+1+ α 2 +6α+1 2α Proof: The inequalities of Lemmas 3 and 4 give: 2ALG c + 2ALG d + (1 + β)alg f + ALG fc + 2KICK OP T c + OP T w = OP T. However, notice that for each packet in KICK, we sent a packet from ALG d that was at least αβ times more valuable. Moreover, ALG fc ALG f /α. This gives { max 1 + β + 1 α, ALG c + OP T. Optimizing β gives ( αβ } ALG αβ ) ALG d + β = (α 1) + α 2 + 6α + 1 2α ( 1 + β + 1 ) ALG f α Thus, our competitive ratio is as claimed. We note that plugging in α = 1 gives a competitive ratio of (2 + 2) which is slightly worse than our general algorithm. However, if α 3 2 then we are better than 3-competitive. Moreover, as α approaches infinity, we approach competitive ratio 2.

7 C. Equal cellular values If all packets have identical cellular value c p = 1 then we can actually be (1 + φ)-competitive, where φ = is the golden ratio. Our algorithm is given in Figure 3. To show this algorithm is (1+φ)-competitive, we slightly modify our definition of ALG w to be those packets we send over WiFi which have wireless values at least φ. We then define ALG x to be those packets we send over WiFi with wireless value smaller than φ. We similarly define OP T w and OP T x. Lemma 5. 2 ALG c + 2 ALG x + 3 ALG w OP T c + OP T w + OP T x. Proof: Consider a packet p OP T ALG w. Since p / ALG w, it was removed from S t at some time x p which we will call p s virtual arrival. Using Hall s Theorem in a manner similar to the proof of Theorem 1, we can show that it is possible to schedule at least half the packets in OP T ALG w within their respective virtual arrival times and deadlines. Since we send all these packets earliest 1 deadline first, we will send at least 2 OP T ALG w packets. Thus, ALG 1 2 OP T ALG w which can be rearranged to give the claim. Further partition OP T x into OP T x and OP T x where OP T x will be the packets OP T sends at a time when we send a packet in ALG w and OP T x = OP T x OP T x. Lemma 6. 2ALG w 2 ALG w OP T w OP T w + OP T x OP T x. Proof: In a manner similar to the proof of Lemma 1, we can construct a mapping π : OP T w OP T x ALG w such that for each p OP T w OP T x we have w π(p) w p and such that for every q ALG w we have π 1 (q) 2. Since all cellular values are equal to 1 and all wireless values are at least 1, the lemma follows. Lemma 7. (φ 1) ALG c + (φ 1) ALG x OP T OP T x. x Proof: Notice that all times at which OP T sends packets in OP T x are times during which we follow an earliest deadline first scheduling policy. Since the packets of OP T x are never in S t, we must send at least OP T x packets during the times we follow an earliest deadline first scheduling policy. Notice that the packets we send during these times are precisely those in ALG c or ALG x, so ALG c + ALG x OP T x. Clearly, φ OP T x OP T x so (φ 1) OP T x OP T x OP T x. Combining both inequalities proves the claim. Lemma 8. The algorithm in Figure 3 is (1+φ)-competitive. Proof: Combining the right-hand sides of lemmas 5, 6 and 7 gives precisely OP T. The left-hand sides sum to (1 + φ)( ALG c + ALG x ) + 2ALG w + ALG w. 1: for all timesteps t do 2: Compute maximum-value feasible schedule S t for times t onward using cellular value. Ensure that for each packet p scheduled at time t p, all packets q scheduled at times [t p, d p ] have deadline at least d p. 3: if S t schedules packet at time t then 4: send the packet scheduled by S t 5: else if t is a WiFi time then 6: send the packet with earliest deadline 7: end if 8: end for Figure 4. Algorithm for fully online, 2-network packet scheduling where all WiFi values are equal. Since all cellular values are 1, ALG c = ALG c. We obtain value at least 1 for each ALG x packet, so ALG x ALG x. Finally, (φ 1)ALG w = 1 φ ALG w ALG w. Thus, the left-hand sides sum to no more than (1 + φ)alg. D. Equal wireless values We now consider the case where all packets have identical wireless value W, but may have varying cellular values (less than W ). We can show that the algorithm in Figure 4 is in fact 2-competitive. Lemma 9. ALG w OP T w. Proof: Let ALG w (t) denote the wireless value obtained by our algorithm up to time t and Z(t) denote the optimum offline wireless value obtainable from all times after t given the decisions of our algorithm up to time t. Note that ALG w (0) + Z(0) = OP T w. We will show that ALG w (t) + Z(t) is non-decreasing, proving the claim since at the final time t f we have Z(t f ) = 0. Suppose t + 1 is a cellular time. Then clearly ALG w (t + 1) = ALG w (t). Suppose our algorithm decides to send some packet p. Let T be the first time slot at which the current feasible schedule has no packet scheduled. Let S be the set of packets currently scheduled between time t + 1 and T. Note that since we send p, it must be that T d p and for each q S we have d p d q T. Suppose, by way of contradiction, that all Z(t) solutions send p and consider the one that schedules p earliest. Let t p be the time Z(t) schedules p and note t p > t. No packet in S can be sent by Z(t) over wireless prior to t p otherwise we could swap with p and get an earlier time for p. However, this means some packet in S must not be sent wirelessly by Z(t) and we could swap with p to get a schedule Z(t) that doesn t use p. Thus Z(t + 1) = Z(t). Now, suppose t + 1 is a WiFi time. If our algorithm is unable to send a packet, then clearly ALG w (t + 1) = ALG w (t) and Z(t + 1) = Z(t). If our algorithm sends some packet p but Z(t) has no packet scheduled, then ALG w (t + 1) = ALG w (t) + W and Z(t + 1) Z(t) W.

8 If our algorithm sends p and Z(t) sends q then we know d p d q. If Z(t) scheduled p then we could swap p and q and have Z(t) send p at this time instead. Otherwise, if Z(t) doesn t schedule p, we have ALG w (t + 1) = ALG w (t) + W and Z(t + 1) Z(t) W. In all cases, we have ALG w (t + 1) + Z(t + 1) ALG w (t) + Z(t). Lemma 10. 2ALG c + ALG w OP T c. Proof: Following the Online Maximum-Weighted Matching with Vertex Locking proof in [17], let a denote the increase in matching weight upon arrival of task a. Since we occasionally send scheduled packets over WiFi, we now get ALG w +ALG c a a. Let ρ t (b) denote the decrease in matching weight at time t if we remove time slot b as a potential match. Thus, if ρ(b) represents the final ρ t (b), then we have b cellular ρ(b) = ALG c. Note that ρ t (b) is still non-decreasing with time for cellular time slots b. Our proof of this holds when packets arrive and when time slots lock, so we need only show ρ t (b) is non-decreasing when a time slot is declared WiFi. Note that when a time slot is declared WiFi the bipartite graph remains unchanged. Thus, any matching that minimizes b s matched value at this new time was also possible before WiFi was declared. So it follows that ρ t (b) ρ t+1 (b) and we get equality when b is not the slot being declared WiFi. Thus, for each a and cellular b, we must have a +ρ t (b) w ab where w ab is the weight of matching a to b. Summing over all OP T edges in the matching proves the claim. We can simply combine Lemmas 9 and 10 to get the following: Theorem 4. The algorithm in Figure 4 is 2-competitive. VIII. OFFLINE PACKETS We now consider the variant in which all packets are known up front (but may still have varying arrival times). Under this model, we improve our competitive ratios for the online packet model when cellular values are equal. In the case where all wireless values are equal and all cellular values are equal, we show we can be optimal. A. Equal cellular values We will show that the algorithm in Figure 5 is 2- competitive. This gives a slight improvement over our result for the fully online version of this problem. Lemma 11. 2ALG w 2ALG wc OP T w OP T wc. Proof: Let p be a packet OP T sends over WiFi at time t p. If p ALG w then set π(p) = p. If at time t p we did not yet send p then p was a candidate packet during t p. This means we must send a packet q of wireless value at least w p at time t p, so set π(p) = q. Otherwise we send p over cellular at some time t p < t p. But at time t p it must be that there were packets scheduled by S tp from times t p +1 up to d p with wireless value at least t p. One of these packets must 1: for all timesteps t do 2: Compute most-valuable-packet-first feasible schedule S t for times t + 1 onward using WiFi values. 3: if t is cellular then 4: send the earliest deadline packet not in S t 5: else 6: send the highest wireless value packet 7: end if 8: end for Figure 5. Algorithm for 2-network packet scheduling with offline packets where all cellular values are equal. be available to be sent at time t p. Thus, we know that the packet q we send at time t p has wireless value at least w p and we can set π(p) = q. Notice that each of our wireless packets is charged at most twice: once by itself and once by the packet OP T sends at the same time. Thus our wireless value is at most half the optimum wireless value. Moreover, since all packets have the same cellular value, the claim follows. Lemma 12. 2ALG wc + 2ALG c OP T c + OP T wc. Proof: Note that at time t = 0, we are guaranteed to get at least the cellular value of all the packets in S 0. Then if OP T c (S 0 ) denotes the total value of packets in S 0 which optimum sends at cellular and OP T wc (S 0 ) denote the total cellular value of packets in S 0 which optimum sends over WiFi, we have ALG c + ALG wc OP T c (S 0 ) + OP T wc (S 0 ). At time t = 0, we are also guaranteed to get at least the optimum cellular value of packets not in S 0 since earliest deadline first is optimal in this case. Thus, we must have ALG c OP T c (S 0 ). Finally, consider all those packets in S 0 that optimum sends over WiFi. Since these packets are not in S 0, we must have a packet scheduled at every time during their windows. Thus, whenever OP T sends one of these packets, we also send a packet. Thus, we have ALG wc OP T wc (S 0 ). Combining all the inequalities proves the claim. Theorem 5. The algorithm in Figure 5 is 2-competitive. B. Equal wireless and equal cellular values We show that when all packets have equal wireless value and equal cellular value we can be optimal. This algorithm is as shown in Figure 6. Theorem 6. The algorithm in Figure 6 is optimal. Proof: We first show that we send a wireless packet whenever OP T does. Let p OP T w and let t be the time

9 1: for all timesteps t do 2: Compute maximum-value feasible schedule S t for times t onward using cellular values. Ensure that for each packet p scheduled at time t p, there are packets scheduled every time between t p and d p with deadline no earlier than d p. 3: if S t schedules packet at time t then 4: send the packet scheduled by S t 5: else if t is WiFi then 6: send the packet with earliest deadline 7: end if 8: end for Figure 6. Algorithm for 2-network packet scheduling with offline packets where all cellular values are equal and all WiFi values are equal. OP T sent it. If we did not yet send p at time t, then it is clear we must send some packet at t. If we already sent p prior to t, then we know there were packets scheduled up until d p. Thus, one of these packets must be available for us to send. It follows that ALG w ALG wc OP T w OP T wc. Note that all packets scheduled at time t = 0 are eventually sent in some manner. Since we originally scheduled the maximum number of packets possible, it follows that ALG c + ALG wc OP T c + OP T wc. Putting inequalities together gives ALG OP T and proves the claim. IX. OFFLINE CONNECTIVITY We now consider the variant in which network connectivity is known in advance throughout the entire instance, but packets arrive in an online fashion. Again, this model is strictly easier than the fully online model and, consequently, we can improve our competitive ratios. In particular, we improve our competitive ratio for the general problem and for the case when all packets have equal cellular value and WiFi value. A. Arbitrary wireless and cellular values Since all connectivities are known in advance, we know precisely what each (arrived) packet s value will be at each future timestep. Thus, we can simply employ the matching algorithm of [17] to immediately get a competitive ratio of 2. The algorithm works simply by, at each timestep, computing a maximum-value matching of packets to timesteps and sending the packet matched to the current timestep. Theorem 7. The above algorithm is 2-competitive. B. Equal wireless and equal cellular values If all packets have equal wireless value W and equal cellular value C, then we can do slightly better than above. Note that if W C < φ then for every packet we send, we always obtain 1 φ of the value OP T could receive from this packet. Thus, we need only make sure we send more packets than OP T. This can be achieved by simply using an earliestdeadline-first scheduling policy, regardless of what network connectivity we have. On the other hand, if W C φ then the following policy is φ-competitive: On a WiFi timestep, we simply send the packet with earliest deadline. On a cellular timestep, we construct a maximum matching of packets to WiFi timesteps. We then find the packet p of earliest deadline whose removal still allows the same number of WiFi timesteps to be matched. If such a p exists we send it, otherwise we send nothing. Our algorithm then runs the first policy if W C < φ and runs the second policy if W C φ. Theorem 8. The above algorithm is φ-competitive. Proof: It is clear that when W C < φ the first policy achieves competitive ratio of φ. Thus, we need only show that the second policy is φ-competitive when W C φ. Clearly, since we maximize the number of WiFi packets we can send, we have ALG w OP T w. If we had ignored WiFi timesteps entirely and followed an earliest-deadline-first policy, then we would also collect optimum cellular value. However, there may be select cellullar times when OP T sends something and we do not because we are saving it for a WiFi timestep. In this 1 case, φ of the value collected from this WiFi timestep is enough to cover the cellular value we ve lost. Thus, we have 1 φ ALG w + ALG c OP T c. Combining this with the above inequality proves the theorem. X. LOWER BOUNDS FOR 2 NETWORKS We now prove lower bounds on the competitive ratio of any deterministic algorithm. We start by showing that when packets and connectivity are online, no deterministic algorithm can have competitive ratio better than 2, even under the restriction that all cellular values are equal and all wireless values are equal. Thus this gives a lower bound for all versions with online packets. Theorem 9. When connectivity is online, packets arrive online and all packets have equal cellular value and equal wireless value, no deterministic algorithm can be c- competitive for c < 2. Proof: Let ALG be a deterministic algorithm with competitive ratio c. We build a bad instance for this algorithm as follows: Consider starting at t = 0 with a packet A = (0, 1, 1, 2) and cellular connectivity. If the algorithm decides to send A at this time, then at time t = 1 we get WiFi

10 connectivity. If the algorithm decides not to send A, then in the next time step a packet B = (1, 1, 1, 2) arrives and we have cellular connectivity. In either case, the algorithm gets total value 1 whereas the optimum offline value is 2. It follows that c 2. In fact, a similar example shows that no randomized algorithm can be better than 3 2 -competitive: Theorem 10. When connectivity is online, packets arrive online and all packets have equal cellular value and equal wireless value, no randomized algorithm can be c- competitive for c < 3 2. Proof: Suppose, by way of contradiction, that we have a c-competitive randomized algorithm ALG for c < 3 2. Consider an instance where at time 0 packet A = (0, 1, 1, α) arrives and we have cellular connectivity. The algorithm decides to send this packet with some probability p. From here, the instance can run in two ways: (1) in the next timestep we get wireless connectivity, (2) we still have cellular connectivity but a packet B = (1, 1, 1, α). In the α first case, the algorithm s competitive ratio is p+(1 p)α and 2 in the second case, the competitive ratio is 2p+(1 p). Thus, the algorithm s ratio is best when these two quantities are equal. Solving for p gives p = α 3α 2 in which case our compatitive ratio is 3α 2 2α 1 which approaches 3 2 as α. Next, we show that when connectivity is online, packets are offline and cellular values are equal, no deterministic algorithm can be better than 2-competitive: Theorem 11. When connectivity is online, but packets are offline and all packets have equal cellular values, no deterministic algorithm can be c-competitive for c < 2. Proof: Let ALG be a deterministic algorithm with competitive ratio c. Our bad instance for this algorithm will have two packets A = (0, 1, 1, 4) and B = (1, 1, 1, 1). At time t = 0 we will have only cellular connectivity. If ALG sends A, then at the next timestep, we get wireless and can only get total value 2 whereas the optimum value is 4. If ALG does not send A at this time, then in the next time step we have cellular connectivity again. We can only send one of A and B whereas it was possible to send both. Since ALG must follow one of these cases, it follows that it cannot guarantee less than half the optimum profit. Thus c 2. When connectivity is online, packets are offline and WiFi values are equal, we can show a slightly weaker lower bound: Theorem 12. When connectivity is online, but packets are offline and all packets have equal wireless values, no deterministic algorithm can be c-competitive for c < 2. Proof: Consider an instance with the following packets: A = (0, 0, β, 1), B = (0, 1, 1, 1) and C = (0, 2, 0, 1). Suppose at time 0 we have only cellular connectivity. If ALG sends A, then at t = 1 we ll have wireless and at t = 2 we ll only have cellular. Among B and C, we can only hope to get additional value 1. Thus, our total value is 1 + β whereas OP T can get 2 (by sending B at time 0 and C at time 1). Notice that a similar situation arises if the algorithm sends C at time 0 or nothing at time 0. If ALG sends B at time 0, then the remaining times are all cellular. In this case, we only get total value 1 whereas OP T could get 1 + β. Thus, our competitive ratio is the smallest of 1 1+β and 1+β 2. Setting both equal gives β = 2 1 which corresponds to competitive ratio 2. Thus, ALG can be no better than 2-competitive. When connectivities are offline, we can show a lower bound of φ even if all packets have equal wireless value and equal cellular value: Theorem 13. When connectivities are offline and all packets have equal wireless value and equal cellular value, no deterministic algorithm can be c-competitive for c < φ. Proof: Consider a two timestep instance where at t = 0 we have only a cellular connection and at t = 1 we have a WiFi connection. At t = 0 packet A = (0, 1, 1, φ) arrives. If ALG sends A, then no new packets arrive and the instance ends. Thus, ALG gets total value 1 whereas OP T could get value φ. If ALG does not send A at t = 0 then at time t = 1 packet B = (1, 1, 1, φ) arrives. The most ALG can get is φ whereas OP T could have received 1 + φ. In either case, ALG has competitive ratio φ. While there is a gap in many of the cases for offline connectivities, we can easily show that a c-competitive algorithm for this problem implies a c-competitive algorithm for standard packet scheduling. This follows simply because we can treat all timesteps as being of the same network type. Thus, this is in fact true even for the version where all cellular values are equal, or the version where all WiFi values are equal. Given the difficulty in achieving a φ- competitive algorithm for standard packet scheduling, this implies a level of difficulty in getting a tight bound for 2- network packet scheduling with offline connectivities. Theorem 14. A c-competitive algorithm for 2-Network Packet Scheduling with offline connectivities even when restricted to equal cellular values, or equal WiFi values (but not both) is a c-competitive algorithm for standard packet scheduling. XI. MORE THAN 2 NETWORKS A natural generalization of this problem is to consider a hierarchy of network connections. In general, assume we have k types of connections but are guaranteed at least the lowest connection type will be available. Each packet p is then specified by a larger tuple (a p, d p, v p,1, v p,2,..., v p,k ) where v p,i denotes its value if sent over network i. We ll

11 assume the values for each packet satisfy v p,i v p,i+1 for all i. A. Lower Bounds for k 3 Networks Unfortunately, we can show that no deterministic algorithm can be c-competitive for any c: Theorem 15. No deterministic algorithm can have competitive ratio independent of values. Proof: We consider instances with one packet and two time steps and three network types. Thus, this also shows that there s very little we can do to obtain superconstant competitive ratios (except possibly if we have dependence on ratio of values). The example is as follows: Suppose at time 0 we have type-2 connectivity and a packet A = (0, 1, 1, α, α 2 ) arrives where α > c. For our algorithm to be c-competitive, it cannot send the packet at this time step since the next time step could have type-3 connectivity. Similarly, it cannot delay the packet at this time step since the next time step could have type-1 connectivity. However, it must do one of the two so we have a contradiction. Things are not as bad for randomized algorithms, but a large lower bound can still be demonstrated: Theorem 16. No randomized algorithm can be better than (k 1)-competitive Proof: We define a collection of instances I 0,..., I k 2 each with one packet A = (0, k 1, 1, α,..., α k 1 ) and k 1 timesteps. Instance I i has type-j connectivity in timestep j 2 for 2 j i + 2 and type-1 connectivity everywhere else. Suppose we have an r-competitive randomized algorithm. It must send A at time 0 with probability p 1 r in order to be competitive on instance I 0. Similarly, it must send A at time 1 with probability p 1 r to be competitive on instance I 1. Thus, it must send A with probability at least 1 r on each of the k 1 timesteps. Since the sum of these probabilities must be at most 1, we get r k 1. ek B. Randomized, e 1-Competitive Algorithm While there is no hope for a deterministic algorithm, ek e 1 we can give a randomized -competitive algorithm. This algorithm works as follows: When a packet comes in, we randomly and uniformly designate it a specific network to be sent over. Whenever we have a timestep with network i e connectivity, we run the e 1-competitive algorithm of [16]. Since the e e 1-competitive algorithm has the special property that it can operate if only given relative deadlines of the packets, the non-persistance of network connections will not affect its performance. Theorem 17. The algorithm above is ek e 1 -competitive. Proof: Consider the set OP T i of packets the optimum offline schedule sends over network i. If we are given only e 1 this set of packets then we obtain at least e times the optimum offline value for this network. If we increase the set of packets given, then this can only increase the value we obtain. Now, if packets randomly arrive with probability 1 k, then in expectation we will be able to obtain at least e 1 ek OP T i. It follows that in expectation ek e 1 v(alg i) OP T i. Summing over all i finishes the proof. XII. ACKNOWLEDGEMENTS We would like to thank Professor William Kaiser (UCLA), Dr. Maxim Batalin, Zainul Charbiwala and Digvijay Singh for many enlightening discussions about the current state of mobile data transport research. REFERENCES [1] G. Inc. (2010) Gartner says worldwide mobile phone sales to end users grew 8 per cent in fourth quarter 2009; market remained flat in Press Release. [Online]. Available: [2] R. Entner. (2010) Smartphones to overtake feature phones in u.s. by [Online]. Available: smartphones-to-overtake-feature-phones-in-u-s-by-2011/?utm source=feedburner&utm medium=feed&utm campaign=feed:+nielsenwire+(nielsen+wire) [3] N. Balasubramanian, A. Balasubramanian, and A. Venkataramani, Energy consumption in mobile phones: a measurement study and implications for network applications, in Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference (IMC 09), 2009, pp [4] H. Falaki and S. Keshav, Trace-based analysis of wi-fi scanning strategies, ACM SIGMOBILE Mobile Computing and Communications Review, pp , [5] Y. Wang, J. Lin, M. Annavaram, Q. A. Jacobson, J. Hong, B. Krishnamachari, and N. Sadeh, A framework of energy efficient mobile sensing for automatic user state recognition, in Proceedings of the 7th international conference on Mobile systems, applications, and services (MobiSys 09), 2009, pp [6] H. Wu, K. Tan, J. Liu, and Y. Zhang, Footprint: cellular assisted wi-fi ap discovery on mobile phones for energy saving, in Proceedings of the 4th ACM international workshop on Experimental evaluation and characterization (WINTECH 09), 2009, pp [7] J. Wortham. (2009) At&t to urge customers to use less wireless data. [Online]. Available: /12/10/technology/companies/10iphone.html [8]. (2009) Customers angered as iphones overload at&t. [Online]. Available: 03/technology/companies/03att.html [9] C. Song, Z. Qu, N. Blumm, and A.-L. Barabási, Limits of predictability in human mobility, Science, vol. 327, no. 5968, pp , 2010.

12 [10] A. Kesselman, A. Lotker, Y. Mansour, B. Patt-Shamir, B. Schieber, and M. Sviridenko, Buffer overflow management in qos switches, in Proceedings of the thirty-third annual ACM symposium on Theory of computing (STOC 01), 2001, pp [11] B. Hajek, On the competitiveness of on-line scheduling of unit-length packets with hard deadlines in slotted time, in Proceedings of the Conference on Information Sciences and Systems, 2001, pp [12] M. Chrobak, W. Jawor, J. Sgall, and T. Tichý, Improved online algorithms for buffer management in qos switches, ACM Transactions on Algorithms, vol. 3, no. 4, p. 50, [13] F. Li, J. Sethuraman, and C. Stein, Better online buffer management, in Proceedings of the eighteenth annual ACM- SIAM symposium on Discrete algorithms (SODA 07), 2007, pp [14] M. Englert and M. Westermann, Considering suppressed packets improves buffer management in qos switches, in Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms (SODA 07), 2007, pp [15] F. Li, J. Sethuraman, and C. Stein, An optimal online algorithm for packet scheduling with agreeable deadlines, in Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms (SODA 05), 2005, pp [16] Y. Bartal, F. Y. L. Chin, M. Chrobak, S. P. Y. Fung, W. Jawor, R. Lavi, J. Sgall, and T. Tichý, Online competitive algorithms for maximizing throughput of unit jobs, Discrete Algorithms, vol. 4, no. 2, pp , [17] A. Coté, A. Meyerson, A. Roytman, M. Shindler, and B. Tagiku, Energy-efficient online scheduling with deadlines, 2010, unpublished manuscript. APPENDIX ONLINE MAXIMUM-WEIGHT MATCHING WITH VERTEX LOCKING This section provides the 2-competitive algorithm and analysis for Online Maximum-Weight Matching with Vertex Locking described in [17]. To simplify the analysis, we assume that at each time step either one new node of A arrives or one new node of B locks. The algorithm proceeds as follows: At each time, compute the matching µ(a t, B, F t ) which is the maximum-weight matching of the set A t of A nodes which have arrived by time t with B subject to the requirement that the locked edges F t be included in the matching (F t also includes null edges for unmatched locked nodes). Whenever a new node locks, add the appropriate edge from our current matching to F t. Let f(a t, B, F t ) be the cost of matching µ(a t, B, F t ). Suppose that node a A arrives at time t. Define a to be the change in the cost of the optimum matching due to this arrival. Thus by definition a = f(a t, B, F t ) f(a t 1, B, F t 1 ) with the observation that F t = F t 1 and A t = A t 1 {a}. For any b B, define ρt (b) = f(a t, B, F t ) f(a t, B {b}, F t ). For any b B, let v b be the weight of the matching edge for b in the algorithm s final solution (or v b = 0 if b is unmatched). We observe that the algorithm s total weight is given by: ALG = b B v b = a A a Lemma 13. The value of ρ t (b) is non-decreasing with time. Proof: If at time t a new vertex becomes locked then F t 1 F t and A t 1 = A t. Since we pick the appropriate edge from µ(a t, B, F t 1 ) we have f(a t, B, F t ) = f(a t, B, F t 1 ). This new locked edge can only reduce the weight of the best matching to B {b} so f(a t, B {b}, F t ) f(a t, B {b}, F t 1 ). Thus, ρ t (b) ρ t 1 (b). If at time t a new vertex a arrives, then A t 1 A t. One way to calculate f(a t, B {b}, F t ) uses a flow formulation. We add a source vertex incident to each vertex in A t and a sink vertex adjacent to all vertices in B {b}. These new edges will have weight 0 and capacity one. All edges between A t and B {b} will remain unchanged and have capacity one. Then we can find a maximum weight maximum flow to identify our maximum weight matching (since all capacities are integral, we know our flow precisely defines a matching). We augment B with dummy vertices and connect them to the vertices of A with edges of capacity one and weight zero, so as to guarantee that the max-weight flow will saturate all edges from source to A t. We can also do this to calculate f(a t 1, B, F t ). Consider taking the two graphs from these two instances and superimposing them (by merging identical vertices). Capacities of any identical edges will add, but we keep their weights constant. Now, all edges are capacity 2 except for those edges incident on a or b. Notice that the individual flows for these two graphs simply add and still form a valid flow. If we consider a maximum weight flow f over this new graph, then clearly weight(f ) f(a t, B {b}, F t )+ f(a t 1, B, F t ). We now show that f can be decomposed into flows for f(a t, B, F t ) and f(a t 1, B {b}, F t ) which proves our claim. It is clear that in f the unweighted flow value is 2 A t 1. Thus, each A t vertex except a has two units of flow passing through it. So starting from a, we can follow the flow, alternating between B and A vertices. This process must stop at a B vertex and so the path has an odd number of edges. We can then add the flow along each odd edge to f(a t, B, F t ) and the flow along each even edge to f(a t 1, B {b}, F t ). Once this is done, we remove this flow. Note that A vertices now either have 0 units of flow, or 2 units of flow. If b was not involved in this path, then we can start from b and do the same process (being sure to add the flow involving b to f(a t, B, F t )). Again, the A vertices still have either 0 or 2 units of

13 flow. Once a and b are handled, then the remainder of the flow can similarly be decomposed. This constructs valid flows for f(a t, B, F t ) and f(a t 1, B {b}, F t ). Thus weight(f ) f(a t, B, F t ) + f(a t 1, B {b}, F t ). Theorem 18. The algorithm is 2-competitive. Proof: Consider any nodes a A and b B. Suppose that a arrives at time t, and that ab is a possible match (this requires b not yet locked at time t). We can write the following: a + ρ t 1 (b) = [f(a t, B, F t ) f(a t 1, B, F t )] + [f(a t 1, B, F t ) f(a t 1, B {b}, F t )] = f(a t, B, F t ) f(a t 1, B {b}, F t ). The last expression must be at least w ab since one way to form the matching µ(a t, B, F t ) involves taking the matching µ(a t 1, B {b}, F t ) and augmenting by the edge (a, b). If we let τ be the final time for the algorithm (at which we can assume all of B is locked) then by lemma 13 we have a + ρ τ (b) w ab. By definition, we have v b = ρ τ (b). Summing both sides over pairs (a, b) which are matched in the optimum offline solution completes the proof.

arxiv:1112.0829v1 [math.pr] 5 Dec 2011

arxiv:1112.0829v1 [math.pr] 5 Dec 2011 How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly

More information

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks

Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Jasper Goseling IRCTR/CWPC, WMC Group Delft University of Technology The Netherlands j.goseling@tudelft.nl Abstract Jos H. Weber

More information

8.1 Min Degree Spanning Tree

8.1 Min Degree Spanning Tree CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree

More information

Adaptive Online Gradient Descent

Adaptive Online Gradient Descent Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650

More information

Decentralized Utility-based Sensor Network Design

Decentralized Utility-based Sensor Network Design Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu

More information

Completion Time Scheduling and the WSRPT Algorithm

Completion Time Scheduling and the WSRPT Algorithm Completion Time Scheduling and the WSRPT Algorithm Bo Xiong, Christine Chung Department of Computer Science, Connecticut College, New London, CT {bxiong,cchung}@conncoll.edu Abstract. We consider the online

More information

How To Find An Optimal Search Protocol For An Oblivious Cell

How To Find An Optimal Search Protocol For An Oblivious Cell The Conference Call Search Problem in Wireless Networks Leah Epstein 1, and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. lea@math.haifa.ac.il 2 Department of Statistics,

More information

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms

More information

The Relative Worst Order Ratio for On-Line Algorithms

The Relative Worst Order Ratio for On-Line Algorithms The Relative Worst Order Ratio for On-Line Algorithms Joan Boyar 1 and Lene M. Favrholdt 2 1 Department of Mathematics and Computer Science, University of Southern Denmark, Odense, Denmark, joan@imada.sdu.dk

More information

Distributed Computing over Communication Networks: Maximal Independent Set

Distributed Computing over Communication Networks: Maximal Independent Set Distributed Computing over Communication Networks: Maximal Independent Set What is a MIS? MIS An independent set (IS) of an undirected graph is a subset U of nodes such that no two nodes in U are adjacent.

More information

Competitive Analysis of QoS Networks

Competitive Analysis of QoS Networks Competitive Analysis of QoS Networks What is QoS? The art of performance analysis What is competitive analysis? Example: Scheduling with deadlines Example: Smoothing real-time streams Example: Overflow

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES 136 TER 4. INDUCTION, GRHS ND TREES 4.3 Graphs In this chapter we introduce a fundamental structural idea of discrete mathematics, that of a graph. Many situations in the applications of discrete mathematics

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

1 Approximating Set Cover

1 Approximating Set Cover CS 05: Algorithms (Grad) Feb 2-24, 2005 Approximating Set Cover. Definition An Instance (X, F ) of the set-covering problem consists of a finite set X and a family F of subset of X, such that every elemennt

More information

An Innocent Investigation

An Innocent Investigation An Innocent Investigation D. Joyce, Clark University January 2006 The beginning. Have you ever wondered why every number is either even or odd? I don t mean to ask if you ever wondered whether every number

More information

14.1 Rent-or-buy problem

14.1 Rent-or-buy problem CS787: Advanced Algorithms Lecture 14: Online algorithms We now shift focus to a different kind of algorithmic problem where we need to perform some optimization without knowing the input in advance. Algorithms

More information

Truthful and Non-Monetary Mechanism for Direct Data Exchange

Truthful and Non-Monetary Mechanism for Direct Data Exchange Truthful and Non-Monetary Mechanism for Direct Data Exchange I-Hong Hou, Yu-Pin Hsu and Alex Sprintson Department of Electrical and Computer Engineering Texas A&M University {ihou, yupinhsu, spalex}@tamu.edu

More information

Linear Programming Notes VII Sensitivity Analysis

Linear Programming Notes VII Sensitivity Analysis Linear Programming Notes VII Sensitivity Analysis 1 Introduction When you use a mathematical model to describe reality you must make approximations. The world is more complicated than the kinds of optimization

More information

Single machine parallel batch scheduling with unbounded capacity

Single machine parallel batch scheduling with unbounded capacity Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm. Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

More information

An example of a computable

An example of a computable An example of a computable absolutely normal number Verónica Becher Santiago Figueira Abstract The first example of an absolutely normal number was given by Sierpinski in 96, twenty years before the concept

More information

Online Adwords Allocation

Online Adwords Allocation Online Adwords Allocation Shoshana Neuburger May 6, 2009 1 Overview Many search engines auction the advertising space alongside search results. When Google interviewed Amin Saberi in 2004, their advertisement

More information

Passive Discovery Algorithms

Passive Discovery Algorithms t t Technische Universität Berlin Telecommunication Networks Group arxiv:1506.05255v1 [cs.ni] 17 Jun 2015 Optimized Asynchronous Passive Multi-Channel Discovery of Beacon-Enabled Networks Niels Karowski,

More information

Simulation-Based Security with Inexhaustible Interactive Turing Machines

Simulation-Based Security with Inexhaustible Interactive Turing Machines Simulation-Based Security with Inexhaustible Interactive Turing Machines Ralf Küsters Institut für Informatik Christian-Albrechts-Universität zu Kiel 24098 Kiel, Germany kuesters@ti.informatik.uni-kiel.de

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm. Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

More information

Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets

Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Nathaniel Hendren January, 2014 Abstract Both Akerlof (1970) and Rothschild and Stiglitz (1976) show that

More information

On-line machine scheduling with batch setups

On-line machine scheduling with batch setups On-line machine scheduling with batch setups Lele Zhang, Andrew Wirth Department of Mechanical Engineering The University of Melbourne, VIC 3010, Australia Abstract We study a class of scheduling problems

More information

Online Scheduling for Cloud Computing and Different Service Levels

Online Scheduling for Cloud Computing and Different Service Levels 2012 IEEE 201226th IEEE International 26th International Parallel Parallel and Distributed and Distributed Processing Processing Symposium Symposium Workshops Workshops & PhD Forum Online Scheduling for

More information

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding

More information

The Trip Scheduling Problem

The Trip Scheduling Problem The Trip Scheduling Problem Claudia Archetti Department of Quantitative Methods, University of Brescia Contrada Santa Chiara 50, 25122 Brescia, Italy Martin Savelsbergh School of Industrial and Systems

More information

Load balancing of temporary tasks in the l p norm

Load balancing of temporary tasks in the l p norm Load balancing of temporary tasks in the l p norm Yossi Azar a,1, Amir Epstein a,2, Leah Epstein b,3 a School of Computer Science, Tel Aviv University, Tel Aviv, Israel. b School of Computer Science, The

More information

On the Interaction and Competition among Internet Service Providers

On the Interaction and Competition among Internet Service Providers On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,

More information

An Empirical Study of Two MIS Algorithms

An Empirical Study of Two MIS Algorithms An Empirical Study of Two MIS Algorithms Email: Tushar Bisht and Kishore Kothapalli International Institute of Information Technology, Hyderabad Hyderabad, Andhra Pradesh, India 32. tushar.bisht@research.iiit.ac.in,

More information

The Relation between Two Present Value Formulae

The Relation between Two Present Value Formulae James Ciecka, Gary Skoog, and Gerald Martin. 009. The Relation between Two Present Value Formulae. Journal of Legal Economics 15(): pp. 61-74. The Relation between Two Present Value Formulae James E. Ciecka,

More information

Weakly Secure Network Coding

Weakly Secure Network Coding Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this

More information

An improved on-line algorithm for scheduling on two unrestrictive parallel batch processing machines

An improved on-line algorithm for scheduling on two unrestrictive parallel batch processing machines This is the Pre-Published Version. An improved on-line algorithm for scheduling on two unrestrictive parallel batch processing machines Q.Q. Nong, T.C.E. Cheng, C.T. Ng Department of Mathematics, Ocean

More information

Moving Target Search. 204 Automated Reasoning

Moving Target Search. 204 Automated Reasoning Moving Target Search Toru Ishida NTT Communications and Information Processing Laboratories 1-2356, Take, Yokosuka, 238-03, JAPAN ishida%nttkb.ntt.jp@relay.cs.net Richard E. Korf Computer Science Department

More information

Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances

Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances Jialin Zhang Tsinghua University zhanggl02@mails.tsinghua.edu.cn Wei Chen Microsoft Research Asia weic@microsoft.com Abstract

More information

Offline sorting buffers on Line

Offline sorting buffers on Line Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com

More information

Chapter 10. Matching Markets. 10.1 Bipartite Graphs and Perfect Matchings

Chapter 10. Matching Markets. 10.1 Bipartite Graphs and Perfect Matchings From the book Networks, Crowds, and Markets: Reasoning about a Highly Connected World. By David Easley and Jon Kleinberg. Cambridge University Press, 2010. Complete preprint on-line at http://www.cs.cornell.edu/home/kleinber/networks-book/

More information

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover 1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate

More information

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH 31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,

More information

How To Solve The Online Advertising Problem

How To Solve The Online Advertising Problem Frequency Capping in Online Advertising Niv Buchbinder Moran Feldman Arpita Ghosh Joseph (Seffi) Naor July 2, 2014 Abstract We study the following online problem. There are n advertisers. Each advertiser

More information

Fairness in Routing and Load Balancing

Fairness in Routing and Load Balancing Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria

More information

Pricing of Limit Orders in the Electronic Security Trading System Xetra

Pricing of Limit Orders in the Electronic Security Trading System Xetra Pricing of Limit Orders in the Electronic Security Trading System Xetra Li Xihao Bielefeld Graduate School of Economics and Management Bielefeld University, P.O. Box 100 131 D-33501 Bielefeld, Germany

More information

A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre

A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 4, NO 2, JUNE 2009 165 A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre

More information

Scheduling Real-time Tasks: Algorithms and Complexity

Scheduling Real-time Tasks: Algorithms and Complexity Scheduling Real-time Tasks: Algorithms and Complexity Sanjoy Baruah The University of North Carolina at Chapel Hill Email: baruah@cs.unc.edu Joël Goossens Université Libre de Bruxelles Email: joel.goossens@ulb.ac.be

More information

Efficient Fault-Tolerant Infrastructure for Cloud Computing

Efficient Fault-Tolerant Infrastructure for Cloud Computing Efficient Fault-Tolerant Infrastructure for Cloud Computing Xueyuan Su Candidate for Ph.D. in Computer Science, Yale University December 2013 Committee Michael J. Fischer (advisor) Dana Angluin James Aspnes

More information

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

Dynamic TCP Acknowledgement: Penalizing Long Delays

Dynamic TCP Acknowledgement: Penalizing Long Delays Dynamic TCP Acknowledgement: Penalizing Long Delays Karousatou Christina Network Algorithms June 8, 2010 Karousatou Christina (Network Algorithms) Dynamic TCP Acknowledgement June 8, 2010 1 / 63 Layout

More information

1 Construction of CCA-secure encryption

1 Construction of CCA-secure encryption CSCI 5440: Cryptography Lecture 5 The Chinese University of Hong Kong 10 October 2012 1 Construction of -secure encryption We now show how the MAC can be applied to obtain a -secure encryption scheme.

More information

2.3 Convex Constrained Optimization Problems

2.3 Convex Constrained Optimization Problems 42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions

More information

Online Supplement for Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers by Mohammad H. Yarmand and Douglas G.

Online Supplement for Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers by Mohammad H. Yarmand and Douglas G. Online Supplement for Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers by Mohammad H Yarmand and Douglas G Down Appendix A Lemma 1 - the remaining cases In this appendix,

More information

Introduction to Scheduling Theory

Introduction to Scheduling Theory Introduction to Scheduling Theory Arnaud Legrand Laboratoire Informatique et Distribution IMAG CNRS, France arnaud.legrand@imag.fr November 8, 2004 1/ 26 Outline 1 Task graphs from outer space 2 Scheduling

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

Further Analysis Of A Framework To Analyze Network Performance Based On Information Quality

Further Analysis Of A Framework To Analyze Network Performance Based On Information Quality Further Analysis Of A Framework To Analyze Network Performance Based On Information Quality A Kazmierczak Computer Information Systems Northwest Arkansas Community College One College Dr. Bentonville,

More information

Stiffie's On Line Scheduling Algorithm

Stiffie's On Line Scheduling Algorithm A class of on-line scheduling algorithms to minimize total completion time X. Lu R.A. Sitters L. Stougie Abstract We consider the problem of scheduling jobs on-line on a single machine and on identical

More information

Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor

Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor Online algorithms for combinatorial problems Ph.D. Thesis by Judit Nagy-György Supervisor: Péter Hajnal Associate Professor Doctoral School in Mathematics and Computer Science University of Szeged Bolyai

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 3, JUNE 2011 709

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 3, JUNE 2011 709 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 19, NO 3, JUNE 2011 709 Improved Bounds on the Throughput Efficiency of Greedy Maximal Scheduling in Wireless Networks Mathieu Leconte, Jian Ni, Member, IEEE, R

More information

An Approximation Algorithm for Bounded Degree Deletion

An Approximation Algorithm for Bounded Degree Deletion An Approximation Algorithm for Bounded Degree Deletion Tomáš Ebenlendr Petr Kolman Jiří Sgall Abstract Bounded Degree Deletion is the following generalization of Vertex Cover. Given an undirected graph

More information

Bargaining Solutions in a Social Network

Bargaining Solutions in a Social Network Bargaining Solutions in a Social Network Tanmoy Chakraborty and Michael Kearns Department of Computer and Information Science University of Pennsylvania Abstract. We study the concept of bargaining solutions,

More information

The Taxman Game. Robert K. Moniot September 5, 2003

The Taxman Game. Robert K. Moniot September 5, 2003 The Taxman Game Robert K. Moniot September 5, 2003 1 Introduction Want to know how to beat the taxman? Legally, that is? Read on, and we will explore this cute little mathematical game. The taxman game

More information

Product irregularity strength of certain graphs

Product irregularity strength of certain graphs Also available at http://amc.imfm.si ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 7 (014) 3 9 Product irregularity strength of certain graphs Marcin Anholcer

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

K 1 < K 2 = P (K 1 ) P (K 2 ) (6) This holds for both American and European Options.

K 1 < K 2 = P (K 1 ) P (K 2 ) (6) This holds for both American and European Options. Slope and Convexity Restrictions and How to implement Arbitrage Opportunities 1 These notes will show how to implement arbitrage opportunities when either the slope or the convexity restriction is violated.

More information

Cacti with minimum, second-minimum, and third-minimum Kirchhoff indices

Cacti with minimum, second-minimum, and third-minimum Kirchhoff indices MATHEMATICAL COMMUNICATIONS 47 Math. Commun., Vol. 15, No. 2, pp. 47-58 (2010) Cacti with minimum, second-minimum, and third-minimum Kirchhoff indices Hongzhuan Wang 1, Hongbo Hua 1, and Dongdong Wang

More information

Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA

Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA A Factor 1 2 Approximation Algorithm for Two-Stage Stochastic Matching Problems Nan Kong, Andrew J. Schaefer Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA Abstract We introduce

More information

Linear Programming I

Linear Programming I Linear Programming I November 30, 2003 1 Introduction In the VCR/guns/nuclear bombs/napkins/star wars/professors/butter/mice problem, the benevolent dictator, Bigus Piguinus, of south Antarctica penguins

More information

Lecture 6 Online and streaming algorithms for clustering

Lecture 6 Online and streaming algorithms for clustering CSE 291: Unsupervised learning Spring 2008 Lecture 6 Online and streaming algorithms for clustering 6.1 On-line k-clustering To the extent that clustering takes place in the brain, it happens in an on-line

More information

Choice under Uncertainty

Choice under Uncertainty Choice under Uncertainty Part 1: Expected Utility Function, Attitudes towards Risk, Demand for Insurance Slide 1 Choice under Uncertainty We ll analyze the underlying assumptions of expected utility theory

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging

Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Aravind. P, Kalaiarasan.A 2, D. Rajini Girinath 3 PG Student, Dept. of CSE, Anand Institute of Higher Technology,

More information

Size-Constrained Weighted Set Cover

Size-Constrained Weighted Set Cover Size-Constrained Weighted Set Cover Lukasz Golab 1, Flip Korn 2, Feng Li 3, arna Saha 4 and Divesh Srivastava 5 1 University of Waterloo, Canada, lgolab@uwaterloo.ca 2 Google Research, flip@google.com

More information

CPC/CPA Hybrid Bidding in a Second Price Auction

CPC/CPA Hybrid Bidding in a Second Price Auction CPC/CPA Hybrid Bidding in a Second Price Auction Benjamin Edelman Hoan Soo Lee Working Paper 09-074 Copyright 2008 by Benjamin Edelman and Hoan Soo Lee Working papers are in draft form. This working paper

More information

Notes 11: List Decoding Folded Reed-Solomon Codes

Notes 11: List Decoding Folded Reed-Solomon Codes Introduction to Coding Theory CMU: Spring 2010 Notes 11: List Decoding Folded Reed-Solomon Codes April 2010 Lecturer: Venkatesan Guruswami Scribe: Venkatesan Guruswami At the end of the previous notes,

More information

Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom.

Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom. Some Polynomial Theorems by John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom.com This paper contains a collection of 31 theorems, lemmas,

More information

Server Scheduling to Balance Priorities, Fairness and Average Quality of Service

Server Scheduling to Balance Priorities, Fairness and Average Quality of Service Server Scheduling to Balance Priorities, Fairness and Average Quality of Service Nikhil Bansal IBM T. J. Watson Research Center nikhil@us.ibm.com Kirk R. Pruhs Computer Science Department University of

More information

Joint Optimization of Overlapping Phases in MapReduce

Joint Optimization of Overlapping Phases in MapReduce Joint Optimization of Overlapping Phases in MapReduce Minghong Lin, Li Zhang, Adam Wierman, Jian Tan Abstract MapReduce is a scalable parallel computing framework for big data processing. It exhibits multiple

More information

5.1 Bipartite Matching

5.1 Bipartite Matching CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson

More information

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute

More information

3. Mathematical Induction

3. Mathematical Induction 3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)

More information

Cost of Conciseness in Sponsored Search Auctions

Cost of Conciseness in Sponsored Search Auctions Cost of Conciseness in Sponsored Search Auctions Zoë Abrams Yahoo!, Inc. Arpita Ghosh Yahoo! Research 2821 Mission College Blvd. Santa Clara, CA, USA {za,arpita,erikvee}@yahoo-inc.com Erik Vee Yahoo! Research

More information

A New Interpretation of Information Rate

A New Interpretation of Information Rate A New Interpretation of Information Rate reproduced with permission of AT&T By J. L. Kelly, jr. (Manuscript received March 2, 956) If the input symbols to a communication channel represent the outcomes

More information

Universal Portfolios With and Without Transaction Costs

Universal Portfolios With and Without Transaction Costs CS8B/Stat4B (Spring 008) Statistical Learning Theory Lecture: 7 Universal Portfolios With and Without Transaction Costs Lecturer: Peter Bartlett Scribe: Sahand Negahban, Alex Shyr Introduction We will

More information

Energy Efficient Monitoring in Sensor Networks

Energy Efficient Monitoring in Sensor Networks Energy Efficient Monitoring in Sensor Networks Amol Deshpande, Samir Khuller, Azarakhsh Malekian, Mohammed Toossi Computer Science Department, University of Maryland, A.V. Williams Building, College Park,

More information

Topology-based network security

Topology-based network security Topology-based network security Tiit Pikma Supervised by Vitaly Skachek Research Seminar in Cryptography University of Tartu, Spring 2013 1 Introduction In both wired and wireless networks, there is the

More information

About the inverse football pool problem for 9 games 1

About the inverse football pool problem for 9 games 1 Seventh International Workshop on Optimal Codes and Related Topics September 6-1, 013, Albena, Bulgaria pp. 15-133 About the inverse football pool problem for 9 games 1 Emil Kolev Tsonka Baicheva Institute

More information

Online lookahead on parameter learning algorithms for data acknowledgment and scheduling problems

Online lookahead on parameter learning algorithms for data acknowledgment and scheduling problems University of Szeged Department of Computer Algorithms and Artificial Intelligence Online lookahead on parameter learning algorithms for data acknowledgment and scheduling problems Summary of the Ph.D.

More information

Graph Theory Problems and Solutions

Graph Theory Problems and Solutions raph Theory Problems and Solutions Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles November, 005 Problems. Prove that the sum of the degrees of the vertices of any finite graph is

More information

Determination of the normalization level of database schemas through equivalence classes of attributes

Determination of the normalization level of database schemas through equivalence classes of attributes Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014 RESEARCH ARTICLE An Efficient Priority Based Load Balancing Algorithm for Cloud Environment Harmandeep Singh Brar 1, Vivek Thapar 2 Research Scholar 1, Assistant Professor 2, Department of Computer Science

More information

Semi-Matchings for Bipartite Graphs and Load Balancing

Semi-Matchings for Bipartite Graphs and Load Balancing Semi-Matchings for Bipartite Graphs and Load Balancing Nicholas J. A. Harvey Richard E. Ladner László Lovász Tami Tamir Abstract We consider the problem of fairly matching the left-hand vertices of a bipartite

More information